Results for

Sort by:
  • Blog
    November 14, 2019
    In today’s digital world, the need for organizations to align cloud capabilities with business requirements grows every day. While cloud provides dynamic flexibility and scale, it requires organizations to maximize information security to protect their brand reputation from unplanned service disruptions. A lack of governance also significantly increases the risk of data vulnerability. Some of the…
  • Blog
    November 18, 2019
    Nearly every day, we talk with clients who are working hard to update their systems and processes around consumer data privacy in order to comply with the specifics set forth by both the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). We see a good bit of confusion and indecision around how organizations can best manage requests and what…
  • Blog
    October 15, 2019
    Overview Service accounts, frequently used with applications, systems and web services, are a critical component to operations of information technology. The ever-evolving threat landscape for service accounts has changed the way organizations must protect them. This post describes the fundamentals of service accounts, the risks they pose and the challenge for management. What are service…
  • Blog
    October 17, 2019
    The California Attorney General (AG) has issued the Proposed Text of Regulations for implementing the California Consumer Privacy Act of 2018 (CCPA) along with an Initial Statement of Reasons.  Governor Gavin Newsom has signed the amendments to the CCPA.  A short synopsis of the released draft regulations is below. What is included in the Proposed Text of Regulations and the Initial…
  • Blog
    October 18, 2019
    By 2021, more than 75 percent of midsize and large organizations will have adopted a multi-cloud and/or hybrid IT strategy. This infographic details the risks that can happen when moving to cloud and the key steps organizations should take to minimize risk and optimize value.
  • Blog
    October 21, 2019
    It’s a rarely-talked-about adage in business that deserves more attention: procurement pays! Time and again, statistics show a strong correlation between a well-defined procurement process and healthy corporate performance. Regardless of industry, strong procurement functions result in higher revenues and reduced procurement process costs. Which is why it’s important to ensure your procurement…
  • Blog
    October 23, 2019
    Consumer data. Who’s collecting it? How is it being used? What regulations are being put in place that can impact how my organization collects, stores, processes and transfers that data? These are the types of questions that we hear over and over again from many of our clients, who are realizing that they are now faced with some of the most stringent privacy laws for their industries that have…
  • Blog
    October 25, 2019
    The National Institute of Standards and Technology (NIST) and the Office for Civil Rights (OCR) recently hosted another informative conference focused on safeguarding patient information. Representatives from Protiviti’s healthcare/cybersecurity team attended the annual event, which brings together a diverse group from across the healthcare industry, including government, healthcare delivery…
  • Blog
    October 29, 2019
    Cyber crime is growing -- here are six reasons why financial services organizations should build operational resilience now. To learn more about Protiviti's Operational Resilience framework and our 24/7 command center, click here.
  • Blog
    November 5, 2019
    A project must start somewhere. And the best place is right here. Phase Zero, or the very foundational steps an organization would take to begin its journey to a successful implementation of SAP S/4HANA. In this post, we will focus on the processes before implementation and early stage management and governance, looking at the various approaches and key areas that all companies should consider as…
Loading...